Sciweavers

3979 search results - page 120 / 796
» Wild control operators
Sort
View
CRITIS
2007
14 years 11 months ago
Ideal Based Cyber Security Technical Metrics for Control Systems
Much of the world's critical infrastructure is at risk from attack through electronic networks connected to control systems. Security metrics are important because they provid...
Wayne F. Boyer, Miles A. McQueen
USENIX
2007
15 years 9 days ago
Energy Management for Hypervisor-Based Virtual Machines
Current approaches to power management are based on operating systems with full knowledge of and full control over the underlying hardware; the distributed nature of multi-layered...
Jan Stoess, Christian Lang, Frank Bellosa
WWW
2007
ACM
15 years 10 months ago
A fault model and mutation testing of access control policies
To increase confidence in the correctness of specified policies, policy developers can conduct policy testing by supplying typical test inputs (requests) and subsequently checking...
Evan Martin, Tao Xie
CHI
2005
ACM
15 years 10 months ago
Media eyepliances: using eye tracking for remote control focus selection of appliances
This paper discusses the use of eye contact sensing for focus selection operations in remote controlled media appliances. Focus selection with remote controls tends to be cumberso...
Roel Vertegaal, Aadil Mamuji, Changuk Sohn, Daniel...
WOWMOM
2009
ACM
191views Multimedia» more  WOWMOM 2009»
15 years 4 months ago
Multi-channel spectrum-agile MAC protocol with adaptive load control
Abstract— Spectrum-agile radios, also known as cognitive radios, have a great potential to improve spectrum utilization by enabling dynamic access to the spectrum. A key challeng...
Fan Wang, Marwan Krunz